[PDF][PDF] An enhanced method for data hiding using 2-bit xor in image steganography

K Joshi, R Yadav, G Chawla - International Journal of Engineering …, 2017 - academia.edu
As we all know security is needed when we want to send data over any medium so this
requires a secure medium to send data. That's why steganography comes in mind whose …

A hybrid technique for quadrant based data hiding using Huffman coding

RK TKC, B Karthikeyan… - … on Innovations in …, 2015 - ieeexplore.ieee.org
The paper proposes a robust steganography technique to hide the data in an image. The
method proposed uses Huffman coding to minimize the number of bits to be embedded and …

[PDF][PDF] A Novel Approach for Hiding Text Using Image Steganography

S Kaur, S Kaur - International Journal of Computer Science and …, 2010 - academia.edu
With the increasing use of internet for communication, the major concern of these days is,
the security of data being communicated over it. Steganography is the art and science of …

A novel image steganography technique based on similarity of bits pairs

D Shehzad, T Dag - 2017 IEEE 8th Control and System …, 2017 - ieeexplore.ieee.org
Steganography is one of the most important information hiding mechanism, which can be
used along with cryptography for providing adequate data security. The common …

[PDF][PDF] A LSB based image steganography using random pixel and bit selection for high payload

UAME Ali, E Ali, M Sohrawordi… - International Journal of …, 2021 - researchgate.net
Security in digital communication is becoming more important as the number of systems is
connected to the internet day by day. It is necessary to protect secret message during …

[PDF][PDF] Enhancing steganography techniques in digital images

SA Shawkat - Faculty of Computers and Information, Mansoura …, 2007 - researchgate.net
The marvelous development in data transmission technology has put lots of potential on the
process of‎ securing data than before. Lots of methods have last decades for data been …

New approach toward data hiding using XOR for image steganography

K Joshi, R Yadav - 2016 Ninth International Conference on …, 2016 - ieeexplore.ieee.org
With the growth in internet usage, there is a proportional growth in security and privacy
demands. In this paper, a three bit XOR steganography system for concealing messages …

Image Steganography Based on Random Pixel Addition and Discrete Cosine Transform (DCT)

R Patidar, B Prajapat, A Sakreja - International Conference on Advanced …, 2019 - Springer
As the boom in digital technology has gained momentum, there has been a great increase in
the importance of digital images. Though encryption mechanisms are able to protect the …

A new steganography method for embedding message in JPEG images

A Darbani, MM AlyanNezhadi… - 2019 5th conference on …, 2019 - ieeexplore.ieee.org
Steganography is widely applied by information security systems. The aim of steganography
is to create a secret and secure channel between the sender and receiver. Steganography is …

An improved image steganography method with SPIHT and arithmetic coding

LS Nair, LM Joshy - Proceedings of the 3rd International Conference on …, 2015 - Springer
The paper proposes a Steganography scheme which focuses on enhancing the embedding
efficiency. There are only limited ways on which one can alter the cover image contents. So …